/
command_server.go
190 lines (160 loc) · 5.54 KB
/
command_server.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
/*
* Copyright (C) 2018 The "MysteriumNetwork/node" Authors.
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
package server
import (
log "github.com/cihub/seelog"
"github.com/mysterium/node/communication"
"github.com/mysterium/node/identity"
"github.com/mysterium/node/ip"
"github.com/mysterium/node/location"
"github.com/mysterium/node/nat"
"github.com/mysterium/node/openvpn"
"github.com/mysterium/node/openvpn/discovery"
"github.com/mysterium/node/openvpn/middlewares/state"
"github.com/mysterium/node/openvpn/tls"
"github.com/mysterium/node/server"
dto_discovery "github.com/mysterium/node/service_discovery/dto"
"github.com/mysterium/node/session"
"github.com/mysterium/node/version"
"sync"
"time"
)
// Command represent entrypoint for Mysterium server with top level components
type Command struct {
identityLoader func() (identity.Identity, error)
createSigner identity.SignerFactory
ipResolver ip.Resolver
mysteriumClient server.Client
natService nat.NATService
locationDetector location.Detector
dialogWaiterFactory func(identity identity.Identity) communication.DialogWaiter
dialogWaiter communication.DialogWaiter
sessionManagerFactory func(primitives *tls.Primitives, serverIP string) session.Manager
vpnServerFactory func(sessionManager session.Manager, primitives *tls.Primitives, openvpnStateCallback state.Callback) *openvpn.Server
vpnServer *openvpn.Server
checkOpenvpn func() error
protocol string
WaitUnregister *sync.WaitGroup
}
// Start starts server - does not block
func (cmd *Command) Start() (err error) {
log.Info("[Server version]", version.AsString())
err = cmd.checkOpenvpn()
if err != nil {
return err
}
providerID, err := cmd.identityLoader()
if err != nil {
return err
}
cmd.dialogWaiter = cmd.dialogWaiterFactory(providerID)
providerContact, err := cmd.dialogWaiter.Start()
// if for some reason we will need truly external IP, use GetPublicIP()
vpnServerIP, err := cmd.ipResolver.GetOutboundIP()
if err != nil {
return err
}
cmd.natService.Add(nat.RuleForwarding{
SourceAddress: "10.8.0.0/24",
TargetIP: vpnServerIP,
})
if err = cmd.natService.Start(); err != nil {
return err
}
location, err := cmd.locationDetector.DetectLocation()
if err != nil {
return err
}
log.Info("Country detected: ", location.Country)
serviceLocation := dto_discovery.Location{Country: location.Country}
proposal := discovery.NewServiceProposalWithLocation(providerID, providerContact, serviceLocation, cmd.protocol)
primitives, err := tls.NewTLSPrimitives(serviceLocation, providerID)
if err != nil {
return err
}
sessionManager := cmd.sessionManagerFactory(primitives, vpnServerIP)
dialogHandler := session.NewDialogHandler(proposal.ID, sessionManager)
if err := cmd.dialogWaiter.ServeDialogs(dialogHandler); err != nil {
return err
}
stopDiscoveryAnnouncement := make(chan int)
vpnStateCallback := func(state openvpn.State) {
switch state {
case openvpn.ConnectedState:
log.Info("Open vpn service started")
case openvpn.ExitingState:
log.Info("Open vpn service exiting")
close(stopDiscoveryAnnouncement)
}
}
cmd.vpnServer = cmd.vpnServerFactory(sessionManager, primitives, vpnStateCallback)
if err := cmd.vpnServer.Start(); err != nil {
return err
}
signer := cmd.createSigner(providerID)
cmd.WaitUnregister.Add(1)
go cmd.discoveryAnnouncementLoop(proposal, cmd.mysteriumClient, signer, stopDiscoveryAnnouncement)
return nil
}
// Wait blocks until server is stopped
func (cmd *Command) Wait() error {
cmd.WaitUnregister.Wait()
return cmd.vpnServer.Wait()
}
// Kill stops server
func (cmd *Command) Kill() error {
cmd.vpnServer.Stop()
err := cmd.dialogWaiter.Stop()
if err != nil {
return err
}
err = cmd.natService.Stop()
return err
}
func (cmd *Command) discoveryAnnouncementLoop(proposal dto_discovery.ServiceProposal, mysteriumClient server.Client, signer identity.Signer, stopPinger <-chan int) {
for {
err := mysteriumClient.RegisterProposal(proposal, signer)
if err != nil {
log.Errorf("Failed to register proposal: %v, retrying after 1 min.", err)
time.Sleep(1 * time.Minute)
} else {
break
}
}
cmd.pingProposalLoop(proposal, mysteriumClient, signer, stopPinger)
}
func (cmd *Command) pingProposalLoop(proposal dto_discovery.ServiceProposal, mysteriumClient server.Client, signer identity.Signer, stopPinger <-chan int) {
for {
select {
case <-time.After(1 * time.Minute):
err := mysteriumClient.PingProposal(proposal, signer)
if err != nil {
log.Error("Failed to ping proposal: ", err)
// do not stop server on missing ping to discovery. More on this in MYST-362 and MYST-370
}
case <-stopPinger:
log.Info("Stopping discovery announcement")
err := mysteriumClient.UnregisterProposal(proposal, signer)
if err != nil {
log.Error("Failed to unregister proposal: ", err)
}
time.Sleep(200 * time.Millisecond) // sleep for prints to be printed out
cmd.WaitUnregister.Done()
return
}
}
}